I Can’t Get That Out of My Memory! A PLC’s Story About Love, Loss, and Triumph- Jeffrey Shearer

Subscribers:
64,400
Published on ● Video Link: https://www.youtube.com/watch?v=Ct2yOelYTbg



Duration: 22:13
171 views
3


Within industrial control systems, the process of allocating memory or what is more commonly known as “assigning tags” is done without much fanfare and in most cases without much thought. However, understanding PLC or HMI tags usage will serve you well as you create your system recovery plans. Tags can be assigned as temporary program variables, recipe data, calibration and sensor spanning data as well as be used to store historical artifacts for product quality and genealogy.

A tag’s usage has a great impact on not only the running system but also plays a large role during system restore. In this discussion and demonstration, Jeff will walk through the importance of understanding the types of memory allocations within the PLC and HMI in support of creating a thorough recovery plan. We’ll also find out “what the PLC can’t get out of its memory”.

View upcoming Summits: http://www.sans.org/u/DuS

Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE




Other Videos By SANS Institute


2022-08-17Sleeping with the Enemy: A Best Practice Guide for Attacker Engagement
2022-08-17SANS Netwars Core Tournament Version 8 Demo
2022-08-16Cyber Security Expertise - Where Should You Begin?
2022-08-11Kaseya Ransomware Reaction - Lessons Learned
2022-08-02The R Word: Retelling the Recent Rise and Resurgence of Resilient Ransomware-as-a-Service Operators
2022-07-29"Crime Time" | Rethinking Ransomware and How to Disrupt It
2022-07-27Security Conversations That Matter | Seat At The Table
2022-07-20The Anatomy of a Targeted Industrial Ransomware Attack
2022-07-19Enterprise Journey to Multicloud Security
2022-07-19Detection-In-Depth: Out of Band Monitoring for Critical Process Parameters-Gus Serino
2022-07-19I Can’t Get That Out of My Memory! A PLC’s Story About Love, Loss, and Triumph- Jeffrey Shearer
2022-07-19Making Use of All Those SBOMs-Eric Byrnes
2022-07-19Board Room Decisions: How to Use Threat-Informed Industrial Risk Management-Jason Christopher
2022-07-14SANS@Night - Blueprint Podcast Live [REPLAY]
2022-07-07Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
2022-07-06The Real STEM Sadie: Owning Your Story
2022-07-05Recruiting, Training, and Retaining Neurodivergent Talent
2022-07-01Blueprint Podcast Live
2022-07-01Learning to Heal: How Neurodivergent Adults Can Recover from Years of Educational Trauma
2022-06-30Panel | Dear Neurotypicals: What We Wish Co-Workers and Managers Knew
2022-06-28Keynote: The Journey to Inclusion



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training